lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20030527231847.64cfb06b.gstewart@spamcop.net>
Date: Tue, 27 May 2003 23:18:47 +0200
From: Godwin Stewart <gstewart@...mcop.net>
To: "K. K. Mookhey" <cto@....co.in>
Subject: Re: NII Advisory - Buffer Overflow in Analogx Proxy


And Thus Spake "K. K. Mookhey" <cto@....co.in> (on Mon, 26 May 2003 19:41:38
+0530):

> ===============================================
> Buffer Overflow In Analogx Proxy 4.13
> Vendor: Analogx 
> Versions affected: Proxy 4.13 
> Date: 26th May 2003 
> Type of Vulnerability: Remotely Exploitable Buffer Overflow 
> Severity: High 
> By: Network Intelligence India www.nii.co.in
> ===============================================

Unfortunately, the buffer overflow is not the only problem with AnalogX.

The default installation is "everything open", and a very large proportion
of the spam sent flying around the world is sent through open AnalogX
proxies.

http://tinyurl.com/csut (redirects to news.admin.net-abuse.email archives)

-- 
G. Stewart   --   gstewart@...ivet.net -- gstewart@...mcop.net
Registered Linux user #284683
---------------------------------------------------------------
In the 60's people took acid to make the world weird.
Now the world is weird and people take Prozac to make
it normal.


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ